Facebook Pays Indian Hackers The Most For Its Bug Bounty Program

October 14, 2016

Oct 14: In a post yesterday, Facebook revealed that Indian cyber security pros are at the top of the list for rewards distributed under the company's bug bounty program.

fbbugLaunched in 2011, the program was created to report security flaws and bugs in Facebook. Later, it's ambit was extended to cover other Facebook owned operations such as Instagram and WhatsApp.

The Facebook post suggested that in 5 years the company has given out $5 million dollars to ethical hackers who have reported various software bugs. It also pays out in BitCoins to programmers who prefer cyber currencies.

So far in 2016, over 9,000 bug related incidents have been reported to Facebook. And a total of 149 researchers were paid the sum of $611,741, with India receiving the highest payout followed by USA and Mexico.

"Over the past few months, we've sought to better understand what researchers like about our program and where they'd like to see changes," Joey Tyson of the Facebook security team said, while laying out future plans. "Five years of experience has helped us refine and strengthen many aspects of our program, and we heard from researchers that they appreciate our rewards, triaging, and quick fixes."

Earlier this year, a Bengaluru techie won a reward of $15,000 for finding a flaw related to the password system. In September, another Indian found a bug that could have allowed anyone to delete a user's photos. He was given $12,500 by the the social networking company.

Twitter also has a bug bounty program that was initiated in 2014. It has paid $322,420 to the researchers over the course of two years.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 8,2020

Consumer watchdog Which? has claimed that more than one billion Android phones and tablets are vulnerable to hackers as they no longer supported by security updates.

According to the research report, the most at-risk phones are any that run Android 4 or older and those smartphones running Android 7.0 which can not be updated are also at risk.

Based on data from Google analysed by Which?, two in five android device users around the world are no longer receiving the important updates. Currently, those devices are unlikely to have issues, but the lack of security leaves them open to attack.

"It is very concerning that expensive Android devices have such a short shelf life before they lose security support, leaving millions of users at risk of serious consequences if they fall victim to hackers," Kate Bevan editor Which? said in a statement.

"Google and phone manufacturers need to be upfront about security updates with clear information about how long they will last and what customers should do when they run out. The government must also push ahead with planned legislation to ensure manufacturers are far more transparent about security updates for smart devices and their impact on consumers," Kate added.

Android phone released around 2012 or earlier, including popular models like the Samsung Galaxy S3 and Sony Xperia S, are particularly at risk to hackers.

Which? has made suggestions to Android users on what to consider if they have an older phone that may be at risk.

Any Android device which is more than two years old, check whether it can be updated to a newer version of the operating system. If it is on an earlier version than Android 7.0 Nougat, try to update via Settings> System>Advanced System update.

In case a user is not able tto update the phone, the device could be at risk of being hacked if it is running a version of Android 4 or lower.

A user also need to be careful about downloading apps outside the Google Play store and should also install a mobile anti-virus via an app.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 2,2020

Paris, Jul 2: Several interacting exoplanets have already been spotted by satellites. But a new breakthrough has been achieved with, for the first time, the detection directly from the ground of an extrasolar system of this type.

An international collaboration including CNRS researchers has discovered an unusual planetary system, dubbed WASP-148, using the French instrument SOPHIE at the Observatoire de Haute-Provence (CNRS/Aix-Marseille Universite).

The scientists analysed the star's motion and concluded that it hosted two planets, WASP-148b and WASP-148c. The observations showed that the two planets were strongly interacting, which was confirmed from other data.

Whereas the first planet, WASP-148b, orbits its star in nearly nine days, the second one, WASP-148c, takes four times longer. This ratio between the orbital periods implies that the WASP-148 system is close to resonance, meaning that there is enhanced gravitational interaction between the two planets. And it turns out that the astronomers did indeed detect variations in the orbital periods of the planets.

While a single planet, uninfluenced by a second one, would move with a constant period, WASP-148b and WASP-148c undergo acceleration and deceleration that provides evidence of their interaction.

The study will shortly be published in the journal Astronomy & Astrophysics.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 4,2020

The Mars Colour Camera (MCC) onboard ISRO's Mars Orbiter Mission has captured the image of Phobos, the closest and biggest moon of Mars.

The image was taken on July 1 when MOM was about 7,200 km from Mars and 4,200 km from Phobos.

"Spatial resolution of the image is 210 m.

This is a composite image generated from 6 MCC frames and has been color corrected," ISRO said in an update along with the image.

Phobos is largely believed to be made up of carbonaceous chondrites.

According to ISRO, "the violent phase that Phobos has encountered is seen in the large section gouged out from a past collision (Stickney crater) and bouncing ejecta."

"Stickney, the largest crater on Phobos along with the other craters (Shklovsky, Roche & Grildrig) are also seen in this image," it said.

The mission also known as Mangalyaan was initially meant to last six months, but subsequently ISRO had said it had enough fuel for it to last "many years."

The country had on September 24, 2014 successfully placed the Mars Orbiter Mission spacecraft in orbit around the red planet, in its very first attempt, thus breaking into an elite club.

ISRO had launched the spacecraft on its nine-month- long odyssey on a homegrown PSLV rocket from Sriharikota in Andhra Pradesh on November 5, 2013.

It had escaped the earth's gravitational field on December 1, 2013.

The Rs 450-crore MOM mission aims at studying the Martian surface and mineral composition as well as scan its atmosphere for methane (an indicator of life on Mars).

The Mars Orbiter has five scientific instruments - Lyman Alpha Photometer (LAP), Methane Sensor for Mars (MSM), Mars Exospheric Neutral Composition Analyser (MENCA), Mars Colour Camera (MCC) and Thermal Infrared Imaging Spectrometer

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.